cyphunk / sbdl
Secure Boot Definition Languag
☆10Updated 2 years ago
Alternatives and similar repositories for sbdl:
Users that are interested in sbdl are comparing it to the libraries listed below
- Decryption utility for PGP Whole Disk Encryption☆19Updated 3 years ago
- UniSBOM is a tool to build a software bill of materials on any platform with a unified data format.☆34Updated 2 years ago
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆14Updated 2 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- Simplified NAT Slipstream server and client☆20Updated 4 years ago
- A small JS library to generate parametric SVG images of locks and keys, animate them and integrate onto web pages. Released as a support…☆16Updated 2 years ago
- dnscrypt - authenticated and encrypted dns client for nodejs☆14Updated 4 years ago
- ☆19Updated 7 years ago
- Guidelines for Security Disclosures☆25Updated 6 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- Silly proof-of-concept for a PDF chatroom☆21Updated last year
- Ansible scripts to build an attack box☆22Updated 6 years ago
- A library & tool for probing, parsing, and validating security.txt files as specified in RFC 9116☆14Updated last month
- Hook for the PoC for exploiting CVE-2024-32002☆15Updated 10 months ago
- The Multiplatform Linux Sandbox☆15Updated last year
- A Canary which fires when uninstalled☆34Updated 4 years ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- An eBPF detection program for CVE-2022-0847☆28Updated 2 years ago
- vyos based isolation of networks☆11Updated 4 years ago
- A framework for parsing binary data.☆16Updated 2 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- We publish indicators of compromise related to our stories here. See https://blog.team-cymru.com/ for more information.☆9Updated 3 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated 11 months ago
- ☆27Updated 3 years ago
- My attempt at writing exploit POCs for various CVEs☆16Updated 5 years ago
- xlrd2 is a variant of xlrd that is actively maintained☆23Updated 7 months ago